|
Port 5002 Details
known port assignments and vulnerabilities
threat/application/port search:
Port(s) |
Protocol |
Service |
Details |
Source |
5002 |
tcp |
trojans |
SOLICARD ARX
W32.Spybot.IVQ [Symantec-2005-012715-3315-99] (2005.01.26) - Worm with distributed denial of service and backdoor capabilities. Spreads through network shares, MySQL (port 3306)/MS SQL (port 1433) servers with weak passwords, and by exploiting system vulnerabilities (ports 135, 445). Opens a backdoor on one or more of these ports: 1927, 1930, 5002, 5003
SouthWest is vulnerable to a denial of service attack. A remote attacker could send a specially-crafted HTTP request to the HTTP server listening on port 5002 to cause the service to crash. The service must be restarted to regain normal functionality.
References: [BID-4362], [CVE-2002-0496]
Unspecified vulnerability in HP LoadRunner 9.52 allows remote attackers to execute arbitrary code via network traffic to TCP port 5001 or 5002, related to the HttpTunnel feature.
References: [CVE-2011-0272] [BID-45792] [SECUNIA-42898] [OSVDB-70432]
An issue was discovered in Mitsubishi Electric Automation MELSEC-Q series Ethernet interface modules QJ71E71-100, all versions, QJ71E71-B5, all versions, and QJ71E71-B2, all versions. The affected Ethernet interface module is connected to a MELSEC-Q PLC, which may allow a remote attacker to connect to the PLC via Port 5002/TCP and cause a denial of service, requiring the PLC to be reset to resume operation. This is caused by an Unrestricted Externally Accessible Lock.
References: [CVE-2016-8368], [BID-94632]
The network enabled distribution of Kura before 2.1.0 takes control over the device's firewall setup but does not allow IPv6 firewall rules to be configured. Still the Equinox console port 5002 is left open, allowing to log into Kura without any user credentials over unencrypted telnet and executing commands using the Equinox "exec" command. As the process is running as "root" full control over the device can be acquired. IPv6 is also left in auto-configuration mode, accepting router advertisements automatically and assigns a MAC address based IPv6 address.
References: [CVE-2017-7649]
Some other trojans also use this port: cd00r, Shaft, Linux Rootkit IV (4) |
SG
|
5002 |
udp |
hdhomerun |
Drobo Dashboard's discovery uses port 5002 UDP. It broadcasts periodically looking for Drobo NAS devices to manage.
HDHomeRun DVR from SiliconDust uses this port. HDHomeRun can be administered over the Ethernet link to tune channels, broadcast an MPEG stream, etc. The device can be viewed/controlled through a range of Linux/Windows DVR/PVR programs. List of all used ports:
Discovery Protocol - UDP 65001
Control Protocol - TCP 65001
Video stream - UDP 5002 and UDP 5004
LIRC for IR on HD Homerun - UDP 5000
Cisco 11000 Series Content Services Switches (CSS) running WebNS 5.0(x) before 05.0(04.07)S, and 6.10(x) before 06.10(02.05)S allow remote attackers to cause a denial of service (device reset) via a malformed packet to UDP port 5002.
References: [CVE-2004-0352], [BID-9806] |
SG
|
5002 |
tcp |
trojan |
[trojan] Shaft |
Trojans
|
5002 |
tcp |
cd00r |
[trojan] cd00r |
SANS
|
5002 |
tcp |
LinuxRootkitIV(4) |
[trojan] Linux Rootkit IV (4) |
SANS
|
5002 |
tcp |
Shaft |
[trojan] Shaft |
SANS
|
5002 |
tcp |
threat |
W32.Spybot |
Bekkoame
|
5002 |
tcp,udp |
threat |
Shaft DDoS analysis |
Bekkoame
|
5002 |
tcp,udp |
rfe |
radio free ethernet |
IANA
|
5000-5010 |
udp |
applications |
Yahoo Messenger Voice Chat |
Portforward
|
5000-5010 |
udp |
applications |
Yahoo Voice Chat |
Portforward
|
|
11 records found
Related ports: 1927 1930 5001 5003 5004 65001
|